Donate Bitcoin to this wallet:1KkUMXvQ2ko3xcJkzitB7WYgoW6m79WFfmDonate Ethereum to this wallet:0x40E56922F43637224935CDC35e2c96E0392A8505Donate Litecoin to this wallet:LLYAFEyqjH69gkyCEpRjXNyedRCWrVChfL

Tomís AD Bitlocker Password Audit 2.1
Tomís AD Bitlocker Password Audit 2.1
Tomís AD Bitlocker Password Audit is a free Windows utility for querying your Active Directory for all or selected computer objects and returning their recovery password and volume information in a grid-view format giving you a quick overview of the status of your current password recovery capabilities.
If you have configured your BitLocker Drive Encryption to back up recovery information for BitLocker-protected drives to Active Directory Domain Services (AD DS) the backed up BitLocker recovery information is stored in a child object of the computer object. Tomís AD Bitlocker Password Audit enumerates all of the computer objects for your entire Active Directory or for a selected Organizational Unit and retrieves and displays the Bitlocker recovery password in a spreadsheet like format that can easily be filtered and sorted. This makes it easy to answer audit questions such as:
Iíve just implemented Bitlocker, but how do I know that the recovery passwords are being populating for all of my computers?
How can I identify machines that have problems with the Bitlocker process?
How can I identify which machines do NOT have a recovery password?
Tomís AD Bitlocker Password Audit is used by organizations all over the world to audit their Bitlocker implementations. This latest versions adds support for machines with multiple associated keys including Bitlocker-to-Go and have been verified to be compatible with Microsoft Windows 10.
Windows LogosLicense:
Freeware (End User License Agreement)
Requirements:
Microsoft .NET Framework 4.5.2
Bitlocker Active Directory Recovery Password Viewer (included with the Remote Server Administration Toolkit (RSAT)

Tomís AD Password Extender 2.0.0.0
Tomís AD Password Extender 2.0.0.0
Tomís AD Password Extender is a free Windows utility that allows you to select a user account and extend the password expiration date by the amount of days specified in your Group Policy. This is often helpful when you have end-users who are travelling and canít log into the VPN or other Active Directory authenticated system. By extending the expiration you ensure that accounts donít get compromised from having to communicate the password across insecure channels.
Have you ever gotten the call from the Road Warrior or frequent business traveler saying: ďI am on the road and I canít log into the VPNĒ? It is a common problem and happens frequently because end-users forget to change their passwords before they leave for that stressful trip. So, what do we do? In some cases we break security protocols by asking them for their password and set the password to be the same. In other cases we set a new password, but now the cached laptop password is different from their domain or VPN password causing confusion. In either case we might have compromised the account as others might have overheard the conversation. In some cases, we even say they are out of luck until they return to the office temporarily preventing them from working and as a result greatly reduces business productivity. This is where Tomís AD Password Extender can help. Simply pull up their account using the intuitive user interface, highlight, and select Extend Password.
Requirements:
Microsoft .NET Framework 4.5.2
(MD5: DC5D6A9FA8D2874A67E1491BAACE830A )

ToolTipFixer 2.0
ToolTipFixer 2.0
Ever since Microsoft invented the Windows Shell with explorer.exe back in the days of Windows 95, there's been a bug that's gone from one version of Windows to the next; and with each upgrade it became worse and worse - until Vista where it only rears its ugly head every once in a while instead: tooltips appear behind the taskbar, where you can't read them and they are of no use to you. And there's nothing you can do about it!
NST ToolTipFixer patches this bug for once and for all, doing what Microsoft hasn't been able to do in 13 years.
ToolTipFixer 2.0 (October 14, 2008)
Installer options for service vs. application
Minimize memory usage as much as possible
Create standalone ToolTipFixer module
Remove .NET Dependencies

Toolwiz Care 3.1.0.5500
Toolwiz Care 3.1.0.5500
Toolwiz Care is a free tool kit designed to speed up your slow PC. With a multi-functional optimization suite, this Windows system optimizer provides a collection of tools which includes System Checkup, System Cleanup, System Speedup, and 40+ powerful tools to enhance your PC performance, local and network security, and optimize the start-up procedure. Toolwiz team guarantees users that Toolwiz Care will stay free forever. This tool kit is designed for all levels of PC users from beginners to experts.
Features:
The Disk Cleaner tool will clean out all junk files.
The Registry Cleaner tool will make the PC system more stable by cleaning out the bad Registry entries.
The Registry Defrager rebuilds PCs Registry, making the entire system run quicker and smoother.
The History Cleaner protects the users privacy by deleting all activity history and surfing traces.
The Fast Defrger will de-fragment the hard drive with its smart engine, keep the PC running efficiently and prevent the formation of other fragmented files.
The Checkup module provides a full report of users PC system and allows the user to fix all problems with one simple click.
The Boot Report provides a easy to read report that shows the start-up time of users system. It offers a detailed list of the processes loaded since booting.
The Startup Optimizer allows the user to disable or delay the loading of any startup entries. It also provides the users with suggestions of standard processes.
The Game Booster concentrates every system resource for gaming purpose. It temporarily shuts background processes and other unnecessary Windows services. The Game Booster also cleans out the RAM and intensifies processor performance.
The Password Generator creates highly secure passwords with upper and lower case letters, numbers and punctuation symbols.
The File Undelete data recovery software ensures recovery of data permanently deleted from the Recycle Bin or with the help ...

4,547

Mar 12, 2014Toolwiz Software

Tor Browser Bundle 8.0 for Linux, BSD, and Unix 32bit
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 32bit
What is the Tor Browser?
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Want Tor to really work?
You need to change some of your habits, as some things won't work exactly as you are used to.
Use Tor Browser
Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor.
Don't torrent over Tor
Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...

Tor Browser Bundle 8.0 for Linux, BSD, and Unix 64bit
Tor Browser Bundle 8.0 for Linux, BSD, and Unix 64bit
What is the Tor Browser?
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Want Tor to really work?
You need to change some of your habits, as some things won't work exactly as you are used to.
Use Tor Browser
Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor.
Don't torrent over Tor
Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow ...

Tor Browser Bundle 8.0 for Mac OS X
Tor Browser Bundle 8.0 for Mac OS X
What is the Tor Browser?
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Want Tor to really work?
You need to change some of your habits, as some things won't work exactly as you are used to.
Use Tor Browser
Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor.
Don't torrent over Tor
Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the ...

Tor Browser Bundle 8.0 for Windows 32bit
Tor Browser Bundle 8.0 for Windows 32bit
What is the Tor Browser?
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Want Tor to really work?
You need to change some of your habits, as some things won't work exactly as you are used to.
Use Tor Browser
Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor.
Don't torrent over Tor
Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...

Tor Browser Bundle 8.0 for Windows 64bit
Tor Browser Bundle 8.0 for Windows 64bit
What is the Tor Browser?
The Tor software protects you by bouncing your communications around a distributed network of relays run by volunteers all around the world: it prevents somebody watching your Internet connection from learning what sites you visit, it prevents the sites you visit from learning your physical location, and it lets you access sites which are blocked.
The Tor Browser lets you use Tor on Windows, Mac OS X, or Linux without needing to install any software. It can run off a USB flash drive, comes with a pre-configured web browser to protect your anonymity, and is self-contained.
Want Tor to really work?
You need to change some of your habits, as some things won't work exactly as you are used to.
Use Tor Browser
Tor does not protect all of your computer's Internet traffic when you run it. Tor only protects your applications that are properly configured to send their Internet traffic through Tor. To avoid problems with Tor configuration, we strongly recommend you use the Tor Browser. It is pre-configured to protect your privacy and anonymity on the web as long as you're browsing with Tor Browser itself. Almost any other web browser configuration is likely to be unsafe to use with Tor.
Don't torrent over Tor
Torrent file-sharing applications have been observed to ignore proxy settings and make direct connections even when they are told to use Tor. Even if your torrent application connects only through Tor, you will often send out your real IP address in the tracker GET request, because that's how torrents work. Not only do you deanonymize your torrent traffic and your other simultaneous Tor web traffic this way, you also slow down the entire ...

Totem's Sound
Totem's Sound
This is the story of the Norwegian explorer Johan Adrian Jacobsen. From 1881 to 1883 he travelled along the northwestern coasts of the Americas. Commissioned by a support comitee, he purchased and catalogued an immense number of artefacts and objects from local tribes for the German Humboldt Foundation. Totem's Sound is based on his personal accounts.
Well, almost.
Enjoy a day of Johan's journey, featuring great outdoor activities such as canoe races, collecting clams, not getting eaten by a giant grizzley and of course fish oil binge drinking. Get in contact with the local tribes, that are struggling to preserve their ways of life and their cultures in a rapidly changing world.
Credits
Totem's Sound was conceived and produced by gold extra with the support of Causa Creations in the framework of the Humboldt Lab Dahlem, a project by the Kulturstiftung des Bundes in collaboration with the Foundation Preussischer Kulturbesitz Berlin. As part of Rehersal Stage 4 - Travelogue Totem's Sound is being shown in the Museum Dahlen from 23.09.2014 to 08.02.2015.
Developer: Adeline Ducker (Art), Tilmann Hars (Code &amp; Design), Georg Hobmeier (Text &amp; Design), Brian Main (additional Art), Karl Zechenter (Music, Sound &amp; Research)
Libraries: vrld (hump), kadoba (atl), markngo (atc), Xelu (Key-art)
Fonts: LastPriestess, Pixel UniCode by ivancr72
Tested by the amazing Patrick Borgeat, Steven Colling, Henning Thiele, Kasia Zielinska + Timo Rostasy
Thanks to: Harald Hackl (Yurp.at), Schwerpunkt Wissenschaft und Kunst Salzburg, Filipe Canha

TouchpadPal 1.4
TouchpadPal 1.4
Automatically disables touchpad on laptop while typing.
When you are typing a text on your laptop and your thumb accidentally brushes the touchpad, this leads to change the position of the cursor in your document and you need start typing again and again.
Touchpad Pal is utility for Windows XP/Vista/7/8/10 that solves this problem.
It will automatically disable touchpad when you are typing text.
The program is distributed as freeware, but donations are welcome.

Towel Required! for Linux 1.1.4
Towel Required! for Linux 1.1.4
Towel Required! is an edge-of-your-seat arcade shooter where the bullets have been replaced with towels. Grab awesome power-ups, avoid getting touched, and rack up a high score in this hilariously addictive indie game!

Towel Required! for Mac 1.1.4
Towel Required! for Mac 1.1.4
Towel Required! is an edge-of-your-seat arcade shooter where the bullets have been replaced with towels. Grab awesome power-ups, avoid getting touched, and rack up a high score in this hilariously addictive indie game!

Towel Required! for Windows 1.1.4
Towel Required! for Windows 1.1.4
Towel Required! is an edge-of-your-seat arcade shooter where the bullets have been replaced with towels. Grab awesome power-ups, avoid getting touched, and rack up a high score in this hilariously addictive indie game!

Tower Master
Tower Master
Tower Master is a multiplayer platform game with an easy to use drag-and-drop level editor. Cleverly design your own deadly medieval tower and race your opponents to the finish line.
We make an indie game every other month, called the Protocannon project, and want to make our games bigger and better with your support. So feedback is very welcome. Never finished, always stable!
IMPORTANT: Sometimes you need to forward the correct ports to your pc in order for other people to be able to join your game. The standard port is 25000.

TraceRouteOK 1.33 32bit
TraceRouteOK 1.33 32bit
Traceroute track the path that your data travels over the WWW, internet, or the local network.
There are many programs of this type, but this is optimized for fast list of data track and quick query of the data route. This free tool shows you the IP address and the corresponding computer ergo host name for all nodes, and measuring transit delays. This can also help you to identify incorrect routing of the data in local network and to see some information about network infrastructure.
This Network Utility is good for administrator to identify incorrect routing or for curious users who want to know where and how your data from the Internet come to you.
For portable use, please create in the TraceRouteOK working directory TraceRouteOK.ini
Features:
- Very small program
- Variable host name query time
- Selectable timeout for pings
- Very fast data route query
- Portable
- Multilingual
# Installation:
TraceRoute does not require installation, can easily be launched from the desktop with no installation and is ready to use on all Windows operating systems.
# Employment:
Operating systems: Windows 10, Windows 8.1, Windows 7, Windows Server 2000, 2008, 2016, Windows XP, Ultimate, Pro, Enterprise, Home, Business, Edition, 64-bit &amp; 32-bit edition
TraceRouteOK Versions History
New in version 1.33 // 27 June 2018
Bug fix: when change the maximum number of hops in TraceRouteOK
Update the language files in TraceRouteOK and new language: Chinese-Traditional and French
Thanks to Danfong Hsieh for the Chinese-Traditional language.
Thanks to Drake4478 for the French language.

TraceRouteOK 1.33 64bit
TraceRouteOK 1.33 64bit
Traceroute track the path that your data travels over the WWW, internet, or the local network.
There are many programs of this type, but this is optimized for fast list of data track and quick query of the data route. This free tool shows you the IP address and the corresponding computer ergo host name for all nodes, and measuring transit delays. This can also help you to identify incorrect routing of the data in local network and to see some information about network infrastructure.
This Network Utility is good for administrator to identify incorrect routing or for curious users who want to know where and how your data from the Internet come to you.
For portable use, please create in the TraceRouteOK working directory TraceRouteOK.ini
Features:
- Very small program
- Variable host name query time
- Selectable timeout for pings
- Very fast data route query
- Portable
- Multilingual
# Installation:
TraceRoute does not require installation, can easily be launched from the desktop with no installation and is ready to use on all Windows operating systems.
# Employment:
Operating systems: Windows 10, Windows 8.1, Windows 7, Windows Server 2000, 2008, 2016, Windows XP, Ultimate, Pro, Enterprise, Home, Business, Edition, 64-bit &amp; 32-bit edition
TraceRouteOK Versions History
New in version 1.33 // 27 June 2018
Bug fix: when change the maximum number of hops in TraceRouteOK
Update the language files in TraceRouteOK and new language: Chinese-Traditional and French
Thanks to Danfong Hsieh for the Chinese-Traditional language.
Thanks to Drake4478 for the French language.

Train Director 3.9p for Linux
Train Director 3.9p for Linux
Train Director is a clone of the popular Train Dispatcher simulation software. With Train Director you can simulate the work of the Centralized Traffic Control (CTC). Your task is to direct trains running in a territory to their final destination, by throwing switches and clearing signals. Penalties are collected for incorrect or inefficient operations, or for trains arriving late. You can also create your own territories with the included track layout editor. Train Director is available for Windows, Mac OS X and Linux.
User Manual

Train Director 3.9p for Mac
Train Director 3.9p for Mac
Train Director is a clone of the popular Train Dispatcher simulation software. With Train Director you can simulate the work of the Centralized Traffic Control (CTC). Your task is to direct trains running in a territory to their final destination, by throwing switches and clearing signals. Penalties are collected for incorrect or inefficient operations, or for trains arriving late. You can also create your own territories with the included track layout editor. Train Director is available for Windows, Mac OS X and Linux.
User Manual

Train Director 3.9p for Windows
Train Director 3.9p for Windows
Train Director is a clone of the popular Train Dispatcher simulation software. With Train Director you can simulate the work of the Centralized Traffic Control (CTC). Your task is to direct trains running in a territory to their final destination, by throwing switches and clearing signals. Penalties are collected for incorrect or inefficient operations, or for trains arriving late. You can also create your own territories with the included track layout editor. Train Director is available for Windows, Mac OS X and Linux.
User Manual

Transcendence 1.7.400
Transcendence 1.7.400
Space Combat and Exploration in a Vast and Dangerous Galaxy
Domina, a mysterious hyperintelligence, has summoned you.
In Transcendence you are thrust into the middle of a vast galaxy teeming with clashing empires, expansionist AIs, and fearsome xenophobes. You must navigate them all to reach the Galactic Core.
Randomly Generated Star Systems
You'll need a ship powerful enough to take you to St. Katherine's Star, through the Ungoverned Territories and the Outer Realmóall the way to the edge of Human Space.
Adapt your strategy to survive the journey through dozens of randomly generated star systems. Take advantage of scavenged weapons and devices. No two games are ever alike, so adaptation equals survival.
Ares Communue
Over a Hundred Unique Ship Classes
Between you and your goal, pirates, warlords, and slavers prowl.
Blast your way through the swarming tactics of Anarchist battlepods; steel yourself against the EMP attack of the Dwarg masters; and pray to Domina that you can withstand the terrifying archcannon of the Phobos dreadnought. The free game includes over a hundred different kinds of enemy ships and stations, each with distinct abilities.
Deadly Weapons and Arcane Devices
As Domina's call draws you into increasingly alien territory you'll find opportunities to exploit your strange surroundings.
Loot wreckage to obtain more powerful weapons, armor, and shields, or purchase them at dozens of different friendly stations. Earn unique high-tech weapons by completing missions for the Commonwealth Fleet or by helping the Corporate Hierarchy with their research.
Robust Modding System
Transcendence can be freely modified. Create your own enemies, weapons, stations, and systems using a simple XML-based syntax. Take advantage of the sophisticated and powerful scripting system to create custom behaviors, missions, and game-mechanics.

Treasures of Ali-Gar 1.0.2
Treasures of Ali-Gar 1.0.2
In Treasures of Ali-Gar you take on the role of a good wizard who has chosen to explore a castle. Not just any castle. This is the "abandoned" castle of the great (and terrible) Wizard Ali-Gar.
Many years have passed since Ali-Gar was driven from the land by the combined might of the High Wizards and the Knights of Light. All that remains of Ali-Gar is his aging castle. Rumors tell of great riches waiting in the castle for the brave adventurer to find. And of evil forces left begin to guard the treasure.
Can you claim all of the treasure? Play Treasures of Ali-Gar to find out!

Tree Notebook v1.1.0
Tree Notebook v1.1.0
Tree Notebook is a hierarchical notes manager designed for keeping personal information.
The notebook consists of two parts: the public part can be accessed without password, the private part is encrypted, it requires entering a password in order to be opened and used.
Tree Notebook comes as two applications: the desktop one for OS Windows, and the mobile one for iOS (iPhone and iPad devices). The data can be synchronized between the Windows computer and up to three iOS devices via a local Wi-Fi network. No access to Internet is needed for synchronizing.
Tree Notebook keeps a tree-like multilevel hierarchy of folders and notes. Any folder can include notes and other folders, and so fourth. Any item (a note or a folder) can include text of any size. Besides, items can keep attachments like images or other files.
Tree Notebook has useful navigation tools: three separate panes for the entire tree, the current folder in the tree, the current item in the folder, status line indicating the current position in the tree, the lists of History and Favorites which alleviate getting back to the items recently or frequently visited.
Both Windows and iOS apps support quick global search (simplified or conditional) and also local search inside an item text.
The information in Tree Notebook can be attributed in many ways by using various font types, colored flags, graphic icons. The items can be sorted out by several criteria: alphabetically, by creation or modification time, and even by hand (in manually defined order).
Among others, Tree Notebook includes a calendar feature. Any item can have an Event attribute and serve as an alarm clock or reminder.
The Windows Tree Notebook application can import data from OneNote and Evernote. It can also export the information to the Evernote and simple RTF formats.
The Windows app has the context ...

TreeLine v3.0.3
TreeLine v3.0.3
TreeLine stores almost any kind of information in an organized tree structure. Each node in the tree can contain several fields, forming a mini-database.
Features
Stores almost any type of information, including plain text, rich text, HTML, numbers, dates, times, booleans, URLs, etc.
The tree structure helps keep things organized.
Each node can have several fields that form a mini-database.
Several node types, with different sets of fields, can be included in one file.
The node format, including fields, output lines, formatting and tree-view icon, can be defined for each node type.
November 17, 2018 - Release 3.0.3 (stable release)
Bug Fixes:
Fixed an error when adding child count fields to the output format.
Problems with writing config files in Windows portable installations were fixed.
Improved error handling after failing to read or write config files.
In the Windows installer, improve the deletion of files from older versions and avoid problems if installing into a directory shared with other applications.
Cyren is reporting a trojan virus on Virus Total. As so often with Cyren, this is a false positive. The file is safe.
Virus Total Report Here

TreeSize Free v4.22
TreeSize Free v4.22
TreeSize Free tells you where precious disk space has gone. Use the treemap to keep an eye on your disk space.
The freeware can be started from the context menu of a folder or drive and shows you the size of this folder, including its subfolders in an Explorer-like fashion. Large folders can be identified at a glance thanks to the gradient bar displayed in the background. All scan results can be drilled down to file level and filters, e.g. for files of a certain type, can be applied. TreeSize Free will even scan smartphones and mobile devices.
TreeSize Free scans network drives and locally synchronized cloud shares (except on Windows servers and within a Windows domain) - just like TreeSize Personal, our storage analysis solution with many other features!
The column view presents more detailed information for each file and folder. Here you will find the size or number of files as well as the last access date and the owner (and other useful facts).
On touchscreen devices (Windows 8 and higher) you can switch to the intuitive touch interface for even easier navigation.
Scan results can be broken down with the flexible filter feature. You can use the filters, for example, to find files of a certain type, such as temporary files, text files or images and use this information to clean up your hard disks.
TreeSize Free works on the MFT (Master File Table) and reaches extremely high scan speeds. Scanning operations run in a thread, so you will see results almost instantly while TreeSize Free is working in the background. The Explorer context menu and drag &amp; drop operations are supported within the application.
TreeSize Free can apply NTFS compression to directory branches and also displays the compression rate. As the only disk space management solution on the market, ...

Trekker (Portable) 1.2
Trekker (Portable) 1.2
Trekker is a freeware software application that lets you view and manipulate pdf files via a file explorer like side panel. Trekker is designed to be light on system resources and should work on most computers that use Windows from XP or above. This makes PDF Trekker handy for use as a PDF viewer and arranger for older computers, as well as for new ones. Hopefully most of what Trekker does is easy to understand, however it comes with a built in help file that will continue to be updated based on user feedback.
Trekker Features
A file explorer like panel
Viewing of PDF files
Printing of PDF files to the Windows default printer
Splitting and Joining of PDF files
Text extraction from PDF pages
Changelog:
Trekker version 1.2 is released. This version now includes the ability to view and print a range of image files including multipage files like tiff and gif. It also allows images to be converted or joined into to PDF files.

Trend Micro Rescue Disk 3.0.0.1023
Trend Micro Rescue Disk 3.0.0.1023
Trend Micro Rescue Disk allows you to use a CD, DVD, or USB drive to examine your computer without launching Microsoft Windows. It finds and removes persistent or difficult-to-clean security threats that can lurk deep within your operating system.
Rescue Disk does not need to load potentially-infected system files into memory before trying to remove them. It can scan hidden files, system drivers, and the Master Boot Record (MBR) of your computerís hard drive without disturbing the operating system.
Getting Started
Click Download to begin.
If prompted, click Save or Save As, and save the file on your computerís desktop.
While the installer downloads, prepare one of the following:
Blank CD or DVD (do not use a rewritable disc)
Empty USB Drive (128MB or larger)
NOTE: The drive will be reformatted before creating Rescue Disk, and anything already on the USB drive will be lost. Please back up any important files before using a USB drive for Trend Micro Rescue Disk.
When you have finished downloading the file, double-click the Trend Micro Rescue Disk icon to start the installer.
To launch your computer from a CD or DVD, you must set the BIOS to boot from a different device. While the exact procedure differs from computer to computer, the overall process is usually like this:
Insert the disc or USB drive into the computer.
Restart the computer.
When the computer powers up again, look for a BIOS setup message, which often looks like ďPress [KEY] to run ...

Trigger Rally 0.6.5
Trigger Rally 0.6.5
A 3D rally simulation with a great physics engine for drifting, over 100 maps, different terrain materials like dirt, asphalt, sand, ice etc. and various weather, light and fog conditions give this rally simulation the edge over many other free games. You need to make it through the maps in often tight time limits and can further improve by beating the recorded high scores. All attached single races must be finished in time in order to win an event, unlocking additional events and cars. Most maps are equipped with spoken co-driver notes and co-driver icons.
Many configuration details for display and audio adjustments can be edited in the well documented plain text configuration file.
Additional contributed maps and events are ready for download as plugins.
Trigger Rally 0.6.4 works well with common low performance laptops from about 2008. And if something like snow flakes and vegetation sprites demand to much from your system you can just disable it.
Defaults:
key action
Up Accelerate
Down Foot brake / Reverse
Left Steer left
Right Steer right
Space Handbrake
C Change camera view
M Toggle map
N Toggle user interface
K Toggle checkpoints
R Recover car
< > Rotate camera when in 3rd person cam
F12 Save a screenshot to ~/.trigger/
Joystick support can be enabled in the
config file. I'd be interested in any
reports on the performance of the
joystick support.
Changelog:
18/12/2016 - Trigger 0.6.5
- Fixed framerate drop caused by codriver voice on certain post-XP Windows'
- Fixed compilation error of "hiscore1.h" by C++11 compilers
- Added 2 ...

TripleA for Linux v1.9.0.0.13066
TripleA for Linux v1.9.0.0.13066
TripleA is a free online turn based strategy game and board game engine, similar to such board games as Axis &amp; Allies or Risk. TripleA comes with multiple games and over 100 more games can be downloaded from the user community. Supports single player vs AI, hot-seat, Play by Email and Forum, and a hosted Online lobby for live play online.
Recreate World War 2 with the Axis pushing through to Moscow, Japan devouring the Pacific, and the Allies desperately fighting back. Or recreate Napoleon's march across Europe, or Rome defeating the Carthaginian Empire, or Sauron conquering Middle Earth, or even Zombies taking over America! If you have ever played a game where you push little plastic/virtual pieces around, roll dice, conquer the lands of your enemy, &amp; produce new pieces to conquer with, you will be able to jump right into TripleA!
TripleA requires Java 8 or later to be installed
Release Notes
1.9.0.0.13066 - November 18th 2018
Fix determination of transported units during amphibious assaults (#4252)
Use dynamic heap size for installers to fix Windows 32 bit installer (#4328)
Add check for sea units to enemySurfaceExclusionTerritories to fix surface warship objectives (#4351)
Update A&amp;A forum poster for new forum (#4361)
Linux Installation
Once the installer finishes downloading, make it executable (chmod +x ./TripleA_*unix.sh)
Now run the installer (./TripleA_...unix.sh)
Follow the installation prompts to complete the installation

TripleA for Mac v1.9.0.0.13066
TripleA for Mac v1.9.0.0.13066
TripleA is a free online turn based strategy game and board game engine, similar to such board games as Axis &amp; Allies or Risk. TripleA comes with multiple games and over 100 more games can be downloaded from the user community. Supports single player vs AI, hot-seat, Play by Email and Forum, and a hosted Online lobby for live play online.
Recreate World War 2 with the Axis pushing through to Moscow, Japan devouring the Pacific, and the Allies desperately fighting back. Or recreate Napoleon's march across Europe, or Rome defeating the Carthaginian Empire, or Sauron conquering Middle Earth, or even Zombies taking over America! If you have ever played a game where you push little plastic/virtual pieces around, roll dice, conquer the lands of your enemy, &amp; produce new pieces to conquer with, you will be able to jump right into TripleA!
TripleA requires Java 8 or later to be installed
Release Notes
1.9.0.0.13066 - November 18th 2018
Fix determination of transported units during amphibious assaults (#4252)
Use dynamic heap size for installers to fix Windows 32 bit installer (#4328)
Add check for sea units to enemySurfaceExclusionTerritories to fix surface warship objectives (#4351)
Update A&amp;A forum poster for new forum (#4361)

TripleA for Windows v1.9.0.0.13066
TripleA for Windows v1.9.0.0.13066
TripleA is a free online turn based strategy game and board game engine, similar to such board games as Axis &amp; Allies or Risk. TripleA comes with multiple games and over 100 more games can be downloaded from the user community. Supports single player vs AI, hot-seat, Play by Email and Forum, and a hosted Online lobby for live play online.
Recreate World War 2 with the Axis pushing through to Moscow, Japan devouring the Pacific, and the Allies desperately fighting back. Or recreate Napoleon's march across Europe, or Rome defeating the Carthaginian Empire, or Sauron conquering Middle Earth, or even Zombies taking over America! If you have ever played a game where you push little plastic/virtual pieces around, roll dice, conquer the lands of your enemy, &amp; produce new pieces to conquer with, you will be able to jump right into TripleA!
TripleA requires Java 8 or later to be installed
Release Notes
1.9.0.0.13066 - November 18th 2018
Fix determination of transported units during amphibious assaults (#4252)
Use dynamic heap size for installers to fix Windows 32 bit installer (#4328)
Add check for sea units to enemySurfaceExclusionTerritories to fix surface warship objectives (#4351)
Update A&amp;A forum poster for new forum (#4361)

Trojan.Kotver Removal Tool 32bit 2.4.0.1
Trojan.Kotver Removal Tool 32bit 2.4.0.1
This tool removes Trojan.Kotver infections.
Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer.
Discovered:
September 23, 2015
Type:
Removal Information
This tool is designed to remove the infection of Trojan.Kotver.
How to download and run the tool
Important:
Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly.
There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system
Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive
Follow these steps to download and run the tool:
Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers.
Save the file to a convenient location, such as your Windows desktop.
If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ...

Trojan.Kotver Removal Tool 64bit 2.4.0.1
Trojan.Kotver Removal Tool 64bit 2.4.0.1
This tool removes Trojan.Kotver infections.
Trojan.Kotver is a Trojan horse that performs click-fraud operations on the compromised computer.
Discovered:
September 23, 2015
Type:
Removal Information
This tool is designed to remove the infection of Trojan.Kotver.
How to download and run the tool
Important:
Selecting "Run as administrator" will result in an incomplete repair. You must be logged in to the Administrator account and all other users must be logged out in order for the tool to work correctly.
There are two versions of this tool, one designed to run on 32-bit computers and one designed to run on 64-bit computers. To find out if your computer is running a 32-bit or 64-bit version of Windows, please read the following Microsoft Knowledge Base article: How to determine whether a computer is running a 32-bit version or 64-bit version of the Windows operating system
Note for network administrators: If you are running MS Exchange 2000 Server, we recommend that you exclude the M drive from the scan by running the tool from a command line, with the Exclude switch. For more information, read the Microsoft Knowledge Base article: Issues caused by a back up or a scan of the Exchange 2000 M drive
Follow these steps to download and run the tool:
Download FixToolKotver64.exe for 64-bit computers and FixToolKotver32.exe for 32-bit computers.
Save the file to a convenient location, such as your Windows desktop.
If you are sure that you are downloading this tool from the Security Response website, you can skip this step. If you are not sure, or are a network administrator and need to authenticate the files before deployment, follow the steps in the Digital Signature section before proceeding ...

TrueIP 2.0.8.2
TrueIP 2.0.8.2
TrueIP is a small program that runs in the system tray, monitoring your IP address(es). With the click of the mouse, you can view information about your current IP address and hostname. If you have a computer that you need access to remotely but donít have the resources to have a static ip address, this program will help you stay connected easily.
Tracks internal and external IP addresses
Notifications when your IP changes including E-mail, FTP, pop up notification, launching an external application, posting to a custom URL, and a free online service provided by HazteK Software called TrueIP Online
Log your recent IP addresses for review at a later date
Runs in the system tray wasting no space and using minimal resources (relative to other full featured .NET applications)
Works with many Dynamic DNS providers to update your DNS records when your IP changes
Now with portable mode!
TrueIP requires the Microsoft .NET 2.0 framework installed on your system. You can download it from Microsoftís website, or through Windows Updates.
Supported/Tested Operating Systems: Windows 2000, Windows XP, Windows Vista, Windows 7, Windows 10
2.0.8.2 (Released: 2018-05-20)
removed legacy user.config file being generated in the C:\Users\User\AppData\Local\HazteK_Software\ directory when in portable mode

TrustViewer 1.7.4
TrustViewer 1.7.4
TrustViewer is a complete solution for remote access and users support via the Internet.
Just download the full version of TrustViewer smaller than 2 MB, and immediately get to work,
without installation and registration, without limitations, for free for home and commercial use!
Quick start
Download the full version of TrustViewer, run it (enough minimal user rights) and immediately start working, without the need for installation and additional configuration.
Friendly interface
To initiate a communication session is really simple: select in the main form ęGrant access to this computerĽ or ęConnect to a remote computerĽ and follow the step by step instructions.
Easy connection
To connect to a remote computer - it is enough to specify a unique twelve-digit identifier for each session, and the connection will be immediately established, without problems with NAT or Proxy.
Multifunctionality
Control the desktop of the remote computer, exchange files, make voice and video calls, or just chat, and all in one convenient application.
Complete anonymity
TrustViewer does not require authorization or input of other personal data, and our servers do not store an IP address or other information identifying your computer.
Absolute safety
Do not worry about the safety of your computer, because due to architectural features, TrustViewer is not able in principle to provide unauthorized access to it.
Your own server
The computers of participants in priority directly connected, forming a protected p2p-tunnel based on modern cryptoprotocols. Internet servers are used only for coordination, as well as in cases when direct connection is impossible. However, you can install on your server a free dedicated proxy server "TrustServer", and get 100% - independence and control over traffic, incl. in private networks without access to the Internet.
Your own client
The built-in wizard will help you to create the original TrustViewer portable client with your branding (logo, contact information, etc.), with the ...

TSR Copy Changed Files 1.7.0.2
TSR Copy Changed Files 1.7.0.2
The copy changed files tool is a free program that lets you copy changed files from one directory tree to another.
The program only copies changed files, leaving all other files behind.
You can either select to use the date and time for change check, or you can use the binary compare option.
When you have selected how to check for changed files, you can select if you want to append date and/or time to the destination directory/file.
Change Info:
Improved error handling

3,581

Apr 13, 2014TSR Software

TSR Watermark Image (PORTABLE) 3.4.2.8
TSR Watermark Image (PORTABLE) 3.4.2.8
TSR Watermark Image software, is a free program for personal use that can add digital watermarks to all your images, photos and pictures with the transparency you decide. The program can also resize the images before the digital watermark is added.
When creating the watermark, you can use either text or another picture as the source of the watermark. If you want to add the watermark to the background, you can set the logo or the text to be more or less transparent, and define the transparency color on the image or select the first pixel in the upper left corner as transparency color.
You can even use this program instead of photoshop to watermark your images, this is a quicker and more easy way of getting a watermark on all your images. Also use the watermarked image in Word, Excel or images used in pdf files can be made with this watermarking software.
The version available for download is the full version, no missing features, no nag screen, no popup and no commercials!.
The software is free for personal use, if you are using it for business use, please make a purchase after testing the software for $29.00.
Features:
Multilanguage support, English, German, Italian, Japanese, Hungarian, Czech, Romanian, Spanish, French, Dutch, Portuguese (Brazilian &amp; Portugal), Chinese (Simplified &amp; Traditional), Indonesian, Russian and Danish is supported.
Add text watermark that is either normal, embossed, chiseled or watermarked with a border.
Automatically rotate the watermarked picture based on the orientation EXIF tag - this is written to the image by many modern cameras.
Add the text used to watermark the image to the EXIF information in the resulting file.
Keep or drop EXIF information in jpeg files (Camera model/lense model/etc. etc.)
Output the watermarked photo to JPEG, TIFF, PNG, BMP, GIF file format.
Specify the quality of the ...

4,195

Mar 01, 2015TSR

TSR Watermark Image 3.4.2.8
TSR Watermark Image 3.4.2.8
TSR Watermark Image software, is a free program for personal use that can add digital watermarks to all your images, photos and pictures with the transparency you decide. The program can also resize the images before the digital watermark is added.
When creating the watermark, you can use either text or another picture as the source of the watermark. If you want to add the watermark to the background, you can set the logo or the text to be more or less transparent, and define the transparency color on the image or select the first pixel in the upper left corner as transparency color.
You can even use this program instead of photoshop to watermark your images, this is a quicker and more easy way of getting a watermark on all your images. Also use the watermarked image in Word, Excel or images used in pdf files can be made with this watermarking software.
The version available for download is the full version, no missing features, no nag screen, no popup and no commercials!.
The software is free for personal use, if you are using it for business use, please make a purchase after testing the software for $29.00.
Features:
Multilanguage support, English, German, Italian, Japanese, Hungarian, Czech, Romanian, Spanish, French, Dutch, Portuguese (Brazilian &amp; Portugal), Chinese (Simplified &amp; Traditional), Indonesian, Russian and Danish is supported.
Add text watermark that is either normal, embossed, chiseled or watermarked with a border.
Automatically rotate the watermarked picture based on the orientation EXIF tag - this is written to the image by many modern cameras.
Add the text used to watermark the image to the EXIF information in the resulting file.
Keep or drop EXIF information in jpeg files (Camera model/lense model/etc. etc.)
Output the watermarked photo to JPEG, TIFF, PNG, BMP, GIF file format.
Specify the quality of the watermarking ...

4,468

Mar 01, 2015TSR

TTclock 1.44 32bit
TTclock 1.44 32bit
Digital desktop clock + alarm, timer, stopwatch.
TTclock offers two display modes: pure clock display and control panel.
In clock display mode the background is either fully transparent (only visible on mouse hover), or permanently visible as a semi-opaque rectangle (see settings).
Double click switches between pure clock and control panel.
Settings:
Keep on top?
Color for digits, background
Font for digits
Permanent background? - (or only on mouse hover)
Enable 12-hour mode (AM/PM)?
Seconds in clock mode? - (can be hidden)
Sound:
Alarm sound loop? - option to repeat sound continuously
WAV files from TTclock folder (some files supplied)
When started TTclock makes sure it will show within the desktop bounds.
On alarm the control panel is brought to the foreground.
TTclock does not show in the task bar, but keeps an icon in the system tray.
UI language files support

Tunnel Adapter Microsoft 6to4 Adapter Remover 1.2
Tunnel Adapter Microsoft 6to4 Adapter Remover 1.2
The 6to4 adapter is a windows component for correctly transmitting IPv6 packets through a IPv4 network. If you have more than one 6to4 adapter in Device Manager, you likely have experienced a
Windows bug in which a new Microsoft 6to4 adapter was unexpectedly created after a restart in Windows 7 or Windows Server 2008 R2. This can be repaired with Tunnel Adapter Ė 6to4 Adapter Remover. Just download the ZIP and extract its contents to a folder of your choice. For 32-bit systems, run i386.exe (x86), or for 64-bit (x64) systems run ia64.exe.
In some cases, there may be many of these 6to4 adapters listed in Device Manager. Removing them one at a time can be both tedious and time consuming. Our freeware tool automates this process, and will not use devon.exe.
Supported Operating Systems: Windows 10 , Windows 8.1 , Windows 8 , Windows 7 , Windows Vista , Winsows Xp Ė (both x86 and x64)
Supported Languages: English
6to4remover v1.2 what is new (22.05.2013)
Ė The program will no longer use devcon.exe

TurboRisk 2.0.5
TurboRisk 2.0.5
With this software you can play the classic "World Domination Risk" game, where you are battling to conquer the world!
The main features include:
Support for both human or artificial intelligence players, up to ten per game.
Customizable rules.
Smart and customizable interface that speeds up cards playing, attacks and troops movements.
Large selection of AI players, each one with its own "personality".
Context sensitive help.
Statistics window that shows counters for territories and armies.
Optional log window to track the game.
Windows 7 and Vista theme support.
Large selection of maps.
Companion program to create your own custom maps.
History of the played games and ranking of the players.
"Quick setup" feature to save the entire configuration of the players.
Menu option to download news and updates from the TurboRisk homepage.
Full featured companion IDE to edit, compile and test your own artificial intelligence players, and a simulation environment to test them.
TurboRisk is free
TurboRisk is really 100% free: no limitations, no time-outs, no nags, no adware, no banner ads and no spyware. It can be freely used and distributed provided that neither code nor documentation are altered in any way.
System Requirements
Windows 95/98/NT/2000/XP/Vista/7/8/10, Linux Wine
5 to 30MB of free disk space (depending on type of installation)
Screen capable of at least 800x600 recommended
TurboRisk doesn't install any DLL or OCX or any other component in your Windows folders. It doesn't use the registry, except to register its Uninstall program.
For this reason TurboRisk is highly ...

TurboTop 2.8
TurboTop 2.8
Like the "Always on Top" feature that some programs have? TurboTop lets you set any window to be "Always on Top!"
Taskbar With TurboTop Icon (on far right)You're probably familiar with the "Always on Top" feature of some programs. This allows their window to "float" above other windows even when it doesn't have the focus. This can be extremely useful. Unfortunately, not many programs implement this feature. TurboTop is designed to remedy that problem!
TurboTop is a small program that sits in your System Tray. By clicking on the TurboTop icon, you'll be presented with a menu that displays all windows that are currently visible. Simply click on the menu item that corresponds to the window you want to make "Always on Top." The popup menu also shows which windows are currently "Always on Top" by displaying a check mark next to the name of the window. When you click on a checked menu item, TurboTop will make that window not "Always on Top."
New with version 2.0, TurboTop can accept one or more window titles on the command line. The windows that match the title text passed on the command line will be made "Always on Top" automatically as TurboTop is started.
Install and Uninstall support is included.

TurnedOnTimesView v1.40
TurnedOnTimesView v1.40
TurnedOnTimesView is a simple tool that analyses the event log of Windows operating system, and detects the time ranges that your computer was turned on. For every period of time that the computer was turned on, the following information is displayed: Startup Time, Shutdown Time, Duration, Shutdown Reason, Shutdown Type, Shutdown Process, and Shutdown Code.
TurnedOnTimesView allows you to get this information from your local computer, and from remote computer on your network if you have enough privilege to read the event log of Windows remotely.
System Requirements
This utility works on any version of Windows, starting from Windows 2000 and up to Windows 10. both 32-bit and 64-bit systems are supported.
On Windows Vista/7/8, TurnedOnTimesView generally works without elevation (admin rights). However, in order to get information about system shutdown caused by a system crash (blue screen), you should right-click on TurnedOnTimesView.exe and choose 'Run As Administrator'.
Known Limitations
TurnedOnTimesView based on a few types of events on the event log of Windows to detect when the computer was turned off and on. It generally works quite well, but it's still possible that you'll get a false positive, which means that TurnedOnTimesView will show that the computer was turned off and on, even when the computer was not actually turned off.
When the computer is turned off improperly (For example, on a power outage), TurnedOnTimesView will not be able to detect the shutdown time, and the icon of this item will be red instead of green.
If you clear your system event log, TurnedOnTimesView will not be able to detect the shutdown/startup times.
On systems prior to Windows Vista, Shutdown Reason, Shutdown Type, and Shutdown Process fields are usually empty. ...

Tux Paint 0.9.22
Tux Paint 0.9.22
Tux Paint is a free, award-winning drawing program for children ages 3 to 12. It combines an easy-to-use interface, fun sound effects, and an encouraging cartoon mascot who guides children as they use the program.
Kids are presented with a blank canvas and a variety of drawing tools to help them be creative. Along with paintbrush, shapes and text, Tux Paint includes a "stamp" feature to add pre-drawn or photographic imagery to pictures, and a set of "magic tools" that provide filter effects (like blur, tint and waves) and interesting drawing tools (like train tracks, bubbles and grass).
Tux Paint includes a collection of "starter" images, both coloring-book style and photo-realistic, and a large collections of stamps are available as a separate download. Additional content can be added by parents and teachers, or downloaded from 3rd parties.
Download stamps here.

TuxGuitar 1.4 for Mac 32bit
TuxGuitar 1.4 for Mac 32bit
A Multitrack tablature editor and player
With TuxGuitar, you will be able to compose music using the following features
Tablature editor
Score Viewer
Multitrack display
Autoscroll while playing
Note duration management
Various effects (bend, slide, vibrato, hammer-on/pull-off)
Support for triplets (5,6,7,9,10,11,12)
Repeat open and close
Time signature management
Tempo management
Imports and exports gp3,gp4 and gp5 files

TuxGuitar 1.4 for Mac 64bit
TuxGuitar 1.4 for Mac 64bit
A Multitrack tablature editor and player
With TuxGuitar, you will be able to compose music using the following features
Tablature editor
Score Viewer
Multitrack display
Autoscroll while playing
Note duration management
Various effects (bend, slide, vibrato, hammer-on/pull-off)
Support for triplets (5,6,7,9,10,11,12)
Repeat open and close
Time signature management
Tempo management
Imports and exports gp3,gp4 and gp5 files

TuxGuitar 1.4 for Windows
TuxGuitar 1.4 for Windows
A Multitrack tablature editor and player
With TuxGuitar, you will be able to compose music using the following features
Tablature editor
Score Viewer
Multitrack display
Autoscroll while playing
Note duration management
Various effects (bend, slide, vibrato, hammer-on/pull-off)
Support for triplets (5,6,7,9,10,11,12)
Repeat open and close
Time signature management
Tempo management
Imports and exports gp3,gp4 and gp5 files

Tweaking.com - (Right Click) Allow, Block or Remove - Windows Firewall v1.0.0
Tweaking.com - (Right Click) Allow, Block or Remove - Windows Firewall v1.0.0
The point of this program is to make adding/removing programs to/from your Windows firewall easier than ever.
This program will add a right click option to all .exe and .com programs, allowing you to allow, block or remove a program from the Windows firewall in 1 click.
But as the rest of my programs I have gone an extra step, "Shane" style if you will :-D
When you add a program to the firewall, all rules that have the same file path will be removed first and then a new single rule is added.
This can greatly help when a user has multiple different rules for a program and they don't realize it.
A lot of times those rules can conflict and create problems.
Now all those extra rules are removed during the process.
Also when you allow a program through the firewall the settings in the rule are to allow any protocol, any port and allow edge transport.
Basically the settings in the rule are to let the program be fully allowed through.
Aside from allowing programs through you can also block them if need be.
Same thing happens, all current rules that point to the same program are removed and a single new rule is added that blocks the program on every protocol and every port.
And just for those users who like to keep things clean, there is also an option to remove all rules for a program from the firewall.
Nice feature to have when you are uninstalling a game or program and don't want the rules in the firewall any more.
All 3 of these options are just 1 click.
You can also select multiple .exe and .com files at once to make things even faster. All done through Windows Explorer.
How TO INSTALL:
Extract all files from the ...

Tweaking.com - Advanced System Tweaker v2.0.0
==Official Mirror==
Tweaking.com - Advanced System Tweaker v2.0.0
Tweaking.com - Advanced System Tweaker is a central hub for any kind of tweak or anything else that can be done via registry files, commands and vbscript files.
The add-ons in the program allow it to grow and handle just about anything. The program has a direct link to search and find the growing list of add-ons.
The program comes with 37+ add-ons already installed.
Using the program is easy. Browse through the installed add-ons and runs the one you want.
For a 1 click solution you can use Simple System Tweaker
Unlike Simple System Tweaker, Advanced System Tweaker is add-on supported. So it has unlimited possibility. You also only run 1 tweak at a time.
Changelog:
v2.0.0
Major program change. In the previous versions you could only run 1 tweak at a time. Now you can select the tweaks you want first and then apply them all at once.
Multiple code changes and some minor bug fixes.
Added frame containers and lines to the add on creator for tweaks.
v1.2.0
Fixed menu to backup and restore the registry not working.
Updated the Optimize Registry (Compress) to use Tweaking.com - Registry Compressor.

4,706

Dec 21, 2013Tweaking.com

Tweaking.com - Auto Assign Drive Letters 1.0.0
Tweaking.com - Auto Assign Drive Letters 1.0.0
This tool is used to enable &amp; disable the auto mount feature of windows. It also has a scrub feature to remove the previous drive letters assigned to drives no longer hooked to the system.
Example: Running Windows 2003 I plug in a external hard drive for backups. Windows 2003 does not assign a drive letter to the new drive since it is disabled by default in 2003. With this tool I now have 2003 giving drive letters to each new external drive I hook to the system.

Tweaking.com - Disable or Enable Data Execution Prevention (DEP) v1.0.0
Tweaking.com - Disable or Enable Data Execution Prevention (DEP) v1.0.0
This will allow a user to easily turn DEP on or off. DEP can cause some programs to crash, and as such you may need to turn it off. As a plus, for system where DEP is grayed out by windows, you can still enable DEP with this tool. DEP will still be grayed out, but it will be working.
Personal note: I have to keep DEP off on my system for some older programs that I use will work. With DEP on these older programs crash.

Tweaking.com - Disk Error Checking at Next Boot v1.0.0
Tweaking.com - Disk Error Checking at Next Boot v1.0.0
This little tool will set the dirty bit flag on a drive. When the dirty bit flag is set, Windows will perform a disk check and repair any errors it find at the next system boot.
Normally I would set a drive error check by using the tools tab on the properties of a drive. Odd thing is, sometimes it wouldn't be set and I would have to do it again to get the system to scan the drive. This was annoying as I just wasted a reboot and the time it took. So I made this tool to make it easier and faster to get the drive error check going.

Tweaking.com - Envelope Printer v2.0.1
Tweaking.com - Envelope Printer v2.0.1
Tweaking.com - Envelope Printer is a program I made for myself by decided to put it on Tweaking.com for free and available for everyone.
Each month when I have to pay bills I hate having to write out the envelopes (I am not lazy, my hand actually hurts when I handwrite). So I wanted to be able to print them out as I need them and have the addresses I choose. While I could have custom ordered envelopes I decided why not just print out my own and save money from having to order custom ones?
So I made Tweaking.com - Envelope Printer. Not only will it save and store all the addresses you want but it can even print out a picture along side your return address for a added personal touch to the envelopes. In this case my company logo.
So now when I pay bills and need an envelope I put an envelope in my printer, then open the program, load the address and hit print.
While I could have used MS Office Word and other 3rd party programs to print out envelopes, I wanted something that was far easier to use and that required a heck of a lot less mouse clicks to get the job done. The program remembers your settings, so once all ready to go you can open the program, open the address book, choose the address hit use this address and the click print. 4 mouse clicks and you are done :-)
Change Log:
v2.0.1
Fixed bug where the program wouldn't open and would give an error that it couldn't load a push button. This was due to a bug in the controls I use and is now fixed.

Tweaking.com - Envelope Printer v2.0.1 (PORTABLE)
Tweaking.com - Envelope Printer v2.0.1 (PORTABLE)
Tweaking.com - Envelope Printer is a program I made for myself by decided to put it on Tweaking.com for free and available for everyone.
Each month when I have to pay bills I hate having to write out the envelopes (I am not lazy, my hand actually hurts when I handwrite). So I wanted to be able to print them out as I need them and have the addresses I choose. While I could have custom ordered envelopes I decided why not just print out my own and save money from having to order custom ones?
So I made Tweaking.com - Envelope Printer. Not only will it save and store all the addresses you want but it can even print out a picture along side your return address for a added personal touch to the envelopes. In this case my company logo.
So now when I pay bills and need an envelope I put an envelope in my printer, then open the program, load the address and hit print.
While I could have used MS Office Word and other 3rd party programs to print out envelopes, I wanted something that was far easier to use and that required a heck of a lot less mouse clicks to get the job done. The program remembers your settings, so once all ready to go you can open the program, open the address book, choose the address hit use this address and the click print. 4 mouse clicks and you are done :-)
Change Log:
v2.0.1
Fixed bug where the program wouldn't open and would give an error that it couldn't load a push button. This was due to a bug in the controls I use and is now fixed.

Tweaking.com - Hardware Identify (PORTABLE) v2.1.1
Tweaking.com - Hardware Identify (PORTABLE) v2.1.1
Tweaking.com - Hardware Identify will help identify unknown hardware on your system. This program does not help you download drivers but helps let you know what the hardware is so you know what drivers to find.
For example say you just reinstalled a computer and the device manager shows multiple unknown hardware with no drivers installed. Well you don't know what drivers to find since you don't know what the hardware is. Now with Tweaking.com - Hardware Identify you can see what that hard is.
The program also has a easy option to help improve the device database. Once you have all drivers installed you can have the program check for any hardware on the system that isn't in the database and submit it to Tweaking.com. With in a few days the database will be updated and the device list will grow with the help of users like you!
Tweaking.com - Hardware Identify Change Log.
v2.1.1
Updated the program to show the icons for the hardware devices in Windows XP and also to better display the icons on other versions of windows for any that are not setup like default.
Updated the program to pull the unknown or "Other Devices" icon. The class id for unknown or other devices is empty in the registry, so no icon was able to be pulled. The program now takes any device with no class id as unknown or other devices and shows the proper icon.
Fixed bug where tab control wasnt changing colors.
Other small interface changes.

Tweaking.com - Hardware Identify v2.1.1
Tweaking.com - Hardware Identify v2.1.1
Tweaking.com - Hardware Identify will help identify unknown hardware on your system. This program does not help you download drivers but helps let you know what the hardware is so you know what drivers to find.
For example say you just reinstalled a computer and the device manager shows multiple unknown hardware with no drivers installed. Well you don't know what drivers to find since you don't know what the hardware is. Now with Tweaking.com - Hardware Identify you can see what that hard is.
The program also has a easy option to help improve the device database. Once you have all drivers installed you can have the program check for any hardware on the system that isn't in the database and submit it to Tweaking.com. With in a few days the database will be updated and the device list will grow with the help of users like you!
Tweaking.com - Hardware Identify Change Log.
v2.1.1
Updated the program to show the icons for the hardware devices in Windows XP and also to better display the icons on other versions of windows for any that are not setup like default.
Updated the program to pull the unknown or "Other Devices" icon. The class id for unknown or other devices is empty in the registry, so no icon was able to be pulled. The program now takes any device with no class id as unknown or other devices and shows the proper icon.
Fixed bug where tab control wasnt changing colors.
Other small interface changes.

Tweaking.com - Kill Frozen Programs 1.0.0
Tweaking.com - Kill Frozen Programs 1.0.0
This little program I made with my fellow gamers in mind. There have many many games that I have played that will crash or lock up. The problem is when they would do this the game window would stay open, and I couldn't get back to the desktop. Nothing I did could get the desktop to come back, even ctrl + Alt + Delete wouldn't get the task manger to open. This is because the game was set to be on top of everything else. So the only option was restart the computer.
Now with this tool I can hit the Global Keys on my keyboard I set, the program will loop through all the processes on the system killing any that are not responding. Now I can get back to the desktop when a game crashes, and no longer have to reboot :-)

Tweaking.com - Register System Files 1.7.4
Tweaking.com - Register System Files 1.7.4
This will register a list of Dll &amp; Ocx files in the System32 &amp; SysWOW64 directories in Windows. This tool is also a part of Windows Repair (All In One).
What will this fix?
Many, many fixes for problems in windows has to do with registering system files. By registering the system files we are fixing a very wide range of problems that could be happening in windows.

Tweaking.com - Registry Backup PORTABLE v3.5.3
Tweaking.com - Registry Backup PORTABLE v3.5.3
Tweaking.com - Registry Backup is a free backup tool that will use the Windows Volume Shadow Copy Service to backup your system registry.
Key Features:
The program is 100% free.
One click backup and restore.
Can restore from Windows Safe Mode.
Portable version can be ran from a thumb drive and keep backups of multiple systems.
Automatic cleanup of older backups.
Set and control scheduling options.
Can backup &amp; restore all user profiles on the system, not just the ones that are currently loaded.
Control which registry files are backed up or restored.
Detailed logs are saved with each backup.
Multiple easy restore options.
Online videos showing how to use the program and how to use the different restore options.
Quick FAQ:
Q: Does Tweaking.com - Registry Backup support Windows 2000 or older?
A: The program only supports Windows XP and newer because older versions don't have the volume shadow copy service. For older operating systems I recommend my old favorite Erunt. Download - http://majorgeeks.com/Erunt_d1267.html
Q: Why does the program use the Volume Shadow Copy Service instead of the RegSaveKey API like Erunt and others?
A: Microsoft recommends using the Volume Shadow Copy to backup up the registry. This grabs a complete backup of the registry hives as they are.
RegSaveKey function
Quote From Microsoft:
"Applications that back up or restore system state including system files and registry hives should use the Volume Shadow Copy Service instead of the registry functions."
"Using RegSaveKey together with RegRestoreKey to copy subtrees in the registry is not recommended. This method does not trigger notifications and can invalidate handles used by other applications."
By using the Volume Shadow Copy instead of the RegSaveKey API this registry backup program is safer to use.
Changelog:
v3.5.3
Updated ManageACL_32 and ManageACL_64 to v1.5.0
Fixed and adjusted multiple areas of the user interface to better handle systems with high DPI enabled. Many new laptops are coming with HD ...

Tweaking.com - Registry Backup v3.5.3
Tweaking.com - Registry Backup v3.5.3
Tweaking.com - Registry Backup is a free backup tool that will use the Windows Volume Shadow Copy Service to backup your system registry.
Key Features:
The program is 100% free.
One click backup and restore.
Can restore from Windows Safe Mode.
Portable version can be ran from a thumb drive and keep backups of multiple systems.
Automatic cleanup of older backups.
Set and control scheduling options.
Can backup &amp; restore all user profiles on the system, not just the ones that are currently loaded.
Control which registry files are backed up or restored.
Detailed logs are saved with each backup.
Multiple easy restore options.
Online videos showing how to use the program and how to use the different restore options.
Quick FAQ:
Q: Does Tweaking.com - Registry Backup support Windows 2000 or older?
A: The program only supports Windows XP and newer because older versions don't have the volume shadow copy service. For older operating systems I recommend my old favorite Erunt. Download - http://majorgeeks.com/Erunt_d1267.html
Q: Why does the program use the Volume Shadow Copy Service instead of the RegSaveKey API like Erunt and others?
A: Microsoft recommends using the Volume Shadow Copy to backup up the registry. This grabs a complete backup of the registry hives as they are.
RegSaveKey function
Quote From Microsoft:
"Applications that back up or restore system state including system files and registry hives should use the Volume Shadow Copy Service instead of the registry functions."
"Using RegSaveKey together with RegRestoreKey to copy subtrees in the registry is not recommended. This method does not trigger notifications and can invalidate handles used by other applications."
By using the Volume Shadow Copy instead of the RegSaveKey API this registry backup program is safer to use.
Changelog:
v3.5.3
Updated ManageACL_32 and ManageACL_64 to v1.5.0
Fixed and adjusted multiple areas of the user interface to better handle systems with high DPI enabled. Many new laptops are coming with HD screens ...

Tweaking.com - Registry Compressor v1.1.0
Tweaking.com - Registry Compressor v1.1.0
First and foremost, this program does NOT remove or add anything to the registry. This is not a registry cleaner or scanner.
The Windows Registry is a hierarchical database that stores
configuration settings and options on Microsoft Windows operating
systems.
Just like databases the registry can become bloated and large when
there has been a lot of additions and deletions from the registry. When
this happens the system can become slower and use more CPU as
programs and the operating system take longer to read and write to the
registry, just like any other database.
This program does NOT remove or add anything to the registry. What it
does is it rebuilds the registry to new files, when this happens all the
overhead is gone and the registry is smaller and faster.
Microsoft offers a manual way to do this:
How to Compress "Bloated" Registry Hives
http://support.microsoft.com/kb/2498915
Thanks to this program you can now do it with one click.
v1.1.0
Per user request the program now supports the command line /silent or /s and can now also reboot the system if you want it to.
Code changes and cleanup, program is now 330kb smaller

Tweaking.com - Registry Compressor v1.1.0 Portable
Tweaking.com - Registry Compressor v1.1.0 Portable
First and foremost, this program does NOT remove or add anything to the registry. This is not a registry cleaner or scanner.
The Windows Registry is a hierarchical database that stores
configuration settings and options on Microsoft Windows operating
systems.
Just like databases the registry can become bloated and large when
there has been a lot of additions and deletions from the registry. When
this happens the system can become slower and use more CPU as
programs and the operating system take longer to read and write to the
registry, just like any other database.
This program does NOT remove or add anything to the registry. What it
does is it rebuilds the registry to new files, when this happens all the
overhead is gone and the registry is smaller and faster.
Microsoft offers a manual way to do this:
How to Compress "Bloated" Registry Hives
http://support.microsoft.com/kb/2498915
Thanks to this program you can now do it with one click.
v1.1.0
Per user request the program now supports the command line /silent or /s and can now also reboot the system if you want it to.
Code changes and cleanup, program is now 330kb smaller

Tweaking.com - Remote Desktop IP Monitor & Blocker Portable Version v1.0.0
==Official Mirror==
Tweaking.com - Remote Desktop IP Monitor and Blocker Portable Version v1.0.0
For Windows XP, 2003, Vista, 2008, 7, 8 &amp; 2012 (32 &amp; 64 Bit)
I made this program after seeing brute force attacks on a customers server who had remote desktop enabled and open to the internet. The attacks were trying to brute force the password for the administrator account.
The Windows Event Viewer was not showing which IP address the connections were coming from. They were also coming from multiple locations and hitting at random times during the day and night. So tracking them down with the built in Windows tools was going nowhere.
So I decided to make a tool that will monitor and log any IP that hits the remote desktop and to be able to block those IP's.
This free program will monitor the remote desktop port using the Windows netstat API and keep them in a log for later viewing. The program has a built in block IP tool to easily block any IP address. It does this by using the built in Windows IP Security Policy (IPSec). It can only block IP's, but it can not unblock them. To unblock them I have included a guide here: How to remove IP's from the Windows IP Security (IPSec) Added by the Tweaking.com - Block IP Tool
How to remove IP's from the Windows IP Security (IPSec) Added by the Tweaking.com - Block IP Tool
Even though this tool was built for watching the remote desktop port you can use it to watch any single port on the system. So if you have another kind of server running and the port open to the internet you can now log any IP that hits it.

4,353

Dec 21, 2013Tweaking.com

Tweaking.com - Remote Desktop IP Monitor & Blocker v1.0.0
==Official Mirror==
Tweaking.com - Remote Desktop IP Monitor and Blocker v1.0.0
For Windows XP, 2003, Vista, 2008, 7, 8 &amp; 2012 (32 &amp; 64 Bit)
I made this program after seeing brute force attacks on a customers server who had remote desktop enabled and open to the internet. The attacks were trying to brute force the password for the administrator account.
The Windows Event Viewer was not showing which IP address the connections were coming from. They were also coming from multiple locations and hitting at random times during the day and night. So tracking them down with the built in Windows tools was going nowhere.
So I decided to make a tool that will monitor and log any IP that hits the remote desktop and to be able to block those IP's.
This free program will monitor the remote desktop port using the Windows netstat API and keep them in a log for later viewing. The program has a built in block IP tool to easily block any IP address. It does this by using the built in Windows IP Security Policy (IPSec). It can only block IP's, but it can not unblock them. To unblock them I have included a guide here: How to remove IP's from the Windows IP Security (IPSec) Added by the Tweaking.com - Block IP Tool
How to remove IP's from the Windows IP Security (IPSec) Added by the Tweaking.com - Block IP Tool
Even though this tool was built for watching the remote desktop port you can use it to watch any single port on the system. So if you have another kind of server running and the port open to the internet you can now log any IP that hits it.

4,324

Dec 21, 2013Tweaking.com

Tweaking.com - Remove Policies Set By Infections 1.8.0
Tweaking.com - Remove Policies Set By Infections 1.8.0
This will remove the policies that most infections set. Such as disabling the task manager, hiding the desktop, hijacking any exe that is run and many more. This tool is also a part of Windows Repair (All In One).

Tweaking.com - Remove Temp Files 1.7.4
Tweaking.com - Remove Temp Files 1.7.4
This is more of maintenance than a repair. The windows temp folder can grow rather large when not emptied. It can also have files that windows tries to use instead of the proper ones. Also some viruses and infections will be in the temp folder. This tool is also a part of Windows Repair (All In One).

Tweaking.com - Repair CD/DVD Missing/Not Working v1.7.4
Tweaking.com - Repair CD/DVD Missing/Not Working v1.7.4
Repair CD/DVD Missing/Not Working:
This repair may help with CD or DVD drives that are not working as they should.
"The CD drive or the DVD drive does not work as expected on a computer that you upgraded to Windows Vista"
http://support.microsoft.com/kb/929461
"Your CD drive or DVD drive is missing or is not recognized by Windows or other programs"
http://support.microsoft.com/kb/982116
This tool is also a part of Windows Repair (All In One)

Tweaking.com - Repair Icons 1.7.4
Tweaking.com - Repair Icons 1.7.4
If you notice your icons on your system are just a white file the use this repair. When the Windows icon database becomes corrupt you will notice the icons not showing correctly. This tool is also a part of Windows Repair (All In One).
This will delete the icon database on the system, making windows rebuild it and fixing the corrupt icons.

Tweaking.com - Repair Internet Explorer 2.8.8
Tweaking.com - Repair Internet Explorer 2.8.8
This will repair Internet Explorer.
When IE is corrupt and stops working you will notice you get just a white page and nothing more when using it. Also other errors and problems. This repair tool will get IE working normally again. This doesn't replace ANY IE settings. It only repairs IE files. This tool is also a part of Windows Repair (All In One).

Tweaking.com - Repair MDAC and MS Jet 1.7.4
Tweaking.com - Repair MDAC and MS Jet 1.7.4
Any program that needs to work with a database and uses MDAC or MS Jet will fail if they are corrupt. This repair will fix MDAC and MS Jet. This tool is also a part of Windows Repair (All In One).

Tweaking.com - Repair Proxy Settings 1.7.4
Tweaking.com - Repair Proxy Settings 1.7.4
Many infections will set your proxy settings to keep you from getting to websites. This repair will turn the proxy off in the system. This tool is also a part of Windows Repair (All In One).

Tweaking.com - Repair Windows Firewall 2.8.8
Tweaking.com - Repair Windows Firewall 2.8.8
This will repair the Windows Firewall. The firewall is built into the system rather deep. And when the firewall becomes corrupt it can still block out side connections from coming in. Even when turned off. Also when corrupt you are unable to add any exceptions to the firewall. This tool is also a part of Windows Repair (All In One).
This will repair the firewall and get it working normally again.

Tweaking.com - Repair Windows Sidebar/Gadgets v1.7.4
Tweaking.com - Repair Windows Sidebar/Gadgets v1.7.4
Repair Windows Sidebar/Gadgets:
This will help get the sidebar working again if it fails to run, or if some gadgets that once worked no longer work. (Such as gadgets with just a white background)
This tool is also a part of Windows Repair (All In One)

Tweaking.com - Repair Windows Updates 2.8.8
Tweaking.com - Repair Windows Updates 2.8.8
If windows updates are not working then this repair may help. This will reset windows updates and get all the windows update files registered. This tool is also a part of Windows Repair (All In One)
Run this repair if windows updates are failing and is not working correctly.

Tweaking.com - Repair Winsock and DNS Cache 1.7.4
Tweaking.com - Repair Winsock and DNS Cache 1.7.4
This will clear the stored DNS cache in Windows. When the DNS becomes corrupt you will not be able to get to some sites. Flushing and rebuilding the DNS will fix that problem. This tool is also a part of Windows Repair (All In One).
Also resets Winsock entries &amp; resets TCP/IP stack.

Tweaking.com - Repair WMI 2.8.8
Tweaking.com - Repair WMI 2.8.8
This will repair WMI on the system. WMI is used by many Windows services and 3rd party programs. When WMI becomes corrupt these services and programs will fail.
Windows Firewall and also the Windows Action Center are just a few examples of Windows services &amp; programs that use WMI.

Tweaking.com - Reset File Permissions 2.8.8
==Official Mirror==
Tweaking.com - Reset File Permissions 2.8.8
Same as registry permissions, will add admins and system with full access. Will not remove current permissions or owner. This tool is also a part of Windows Repair (All In One).
What will this fix?
Fixes any problem where not having the right permissions to a file will cause things to break, such as windows updates and programs.

4,460

Aug 21, 2014Tweaking.com

Tweaking.com - Reset Registry Permissions v2.9.2
Tweaking.com - Reset Registry Permissions v2.9.2
This will change the owner of the reg keys to Administrators and give admins &amp; system full control. This will not remove any current permissions, it only adds to them. This tool is also a part of Windows Repair (All In One).
What will this fix?
A lot of things actually. Here are a few examples.
You try to install some Windows updates but they fail. If the updates don't have permission to certain keys the updates will fail.
Software wont work. Same as windows updates, if a program cant access a key it needs it will fail.
Registering files gives you an error. When trying to register some system files you get an error that it failed. This is because the reg keys the file needs arent accessible. By fixing the permissions you can again register the files.